Home Mathematics Cognitive Authentication for Smart Healthcare System
Chapter
Licensed
Unlicensed Requires Authentication

Cognitive Authentication for Smart Healthcare System

  • R. Babu , Prithi Samuel and K Jayashree
Become an author with De Gruyter Brill

Abstract1

For cognitive monitoring, that is, behavioral recognition and intellectual tracking of each individual, safe, and reliable monitoring is critical. In recent years, both industry and academia have become interested in cognitive authentication, often known as biometric recognition. The main purpose of cognitive authentication is to recognize, detect, and monitor dissimilarities in biological signatures, behavioral characteristics including facial gestures, biometrics, voices, eye gaze, mannerisms, and posture, among other things. Numerous developing biometric authentication systems are currently becoming incorporated and developed in multidisciplinary sectors such as personally identifiable information, accessibility, and asset monitoring systems. Whenever it comes to simple legalizing and identification surveillance difficulties, conventional security methods are not up to equivalence. To address these issues, an electroencephalogram-based cardiovascular technology is a promising choice for next-generation mechanisms due to brain signals reflecting/ mimicking cognitive style and behaviors. Data encryption and identification tracking are included in today’s modern advanced authentication systems. Users identify themselves by using words/passwords, yet that alone would be insufficient to adequately protect and secure private data. Because standard password protection lacks cognitive distinctiveness, it could be stolen and hacked by anybody. To improve a bad passcode and maintain it, the user must enhance the difficulty level and that will be extremely difficult to remember.

Abstract1

For cognitive monitoring, that is, behavioral recognition and intellectual tracking of each individual, safe, and reliable monitoring is critical. In recent years, both industry and academia have become interested in cognitive authentication, often known as biometric recognition. The main purpose of cognitive authentication is to recognize, detect, and monitor dissimilarities in biological signatures, behavioral characteristics including facial gestures, biometrics, voices, eye gaze, mannerisms, and posture, among other things. Numerous developing biometric authentication systems are currently becoming incorporated and developed in multidisciplinary sectors such as personally identifiable information, accessibility, and asset monitoring systems. Whenever it comes to simple legalizing and identification surveillance difficulties, conventional security methods are not up to equivalence. To address these issues, an electroencephalogram-based cardiovascular technology is a promising choice for next-generation mechanisms due to brain signals reflecting/ mimicking cognitive style and behaviors. Data encryption and identification tracking are included in today’s modern advanced authentication systems. Users identify themselves by using words/passwords, yet that alone would be insufficient to adequately protect and secure private data. Because standard password protection lacks cognitive distinctiveness, it could be stolen and hacked by anybody. To improve a bad passcode and maintain it, the user must enhance the difficulty level and that will be extremely difficult to remember.

Downloaded on 7.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/9783110750584-009/html
Scroll to top button